Our Commitment

elect.info processes political finance data from documented, authoritative sources to create the most comprehensive, traceable map of money in political systems. Trust is foundational to our mission. This page documents the practices, policies, and standards that back that commitment.

Data Integrity

Every record traces to a documented source. We process complete historical records with automated validation at every pipeline stage.

Security

Infrastructure secured with Vault-managed secrets, encrypted storage, network isolation, and automated deployment pipelines.

Privacy

We only publish data already in the public record. No tracking, no profiling, no selling user data. Minimal cookies, no third-party analytics.

Trust Indicators

Active

Documented Sources

All data sources are documented and listed on us.elect.info/datasources.

Active

Automated Pipeline

Data ingestion, transformation, and validation run through automated pipelines with audit trails.

Active

End-to-End Encryption

TLS encryption for all data in transit. Encrypted storage for all data at rest.

Active

Infrastructure as Code

All infrastructure defined in version-controlled code via Kubernetes, ArgoCD, and Tekton.

Ongoing

Coverage Expansion

Expanding from US federal data to include state-level and international election finance data.

Ongoing

Entity Resolution

Graph-based entity resolution connects donors, candidates, and committees across filings.

Data Integrity

Accurate data is the foundation of our mission. Every record in our system traces back to a documented source. Here's how we ensure integrity from source to display.

Data Sources

We ingest data from a variety of authoritative sources including government agencies, election commissions, and other public data providers. All sources are documented and listed on our data sources page.

Pipeline Architecture

Data flows through a multi-tier pipeline with validation at each stage:

1

Bronze (Raw Ingestion)

Official bulk files downloaded and stored as-is in Delta Lake format. Full historical records preserved. 281+ flows across all sources.

2

Silver (Standardization)

Raw data cleaned, typed, and standardized. Date parsing, numeric validation, and schema enforcement applied. Defensive parsing (try_to_date, TRY_CAST) prevents data loss.

3

Gold (Entity Resolution)

Graph-based entity resolution links donors, candidates, and committees across filings. Best-in-class algorithms identify and link records. 38 materialized views.

4

Bullion (Graph Analytics)

Affinity calculations, contribution aggregations, and network analysis produce the final data products served to users.

Validation Practices

  • Complete historical record processing — not sampling
  • Schema enforcement at each pipeline tier
  • Defensive date and numeric parsing to prevent data loss
  • Amendment tracking across filing versions
  • Automated pipeline monitoring with Rundeck orchestration
  • Unity Catalog metadata management for all datasets
  • Full-refresh capability to rebuild from source at any time

Security

Our infrastructure is designed with defense in depth. Secrets management, network isolation, encrypted storage, and automated deployments protect the integrity of our data and systems.

Infrastructure Security

Secrets Management

HashiCorp Vault with Transit auto-unseal manages all secrets. No secrets in code, environment variables injected at runtime.

Network Isolation

Kubernetes network policies enforce service-to-service communication rules. Internal services are not exposed externally.

Encrypted Storage

S3-compatible object storage with encryption at rest. TLS for all data in transit between services.

Identity & Access

Authentik provides authentication for protected resources. Role-based access control for internal systems.

Deployment Security

GitOps Pipeline

All infrastructure changes go through version-controlled code. ArgoCD enforces desired state. No manual cluster modifications.

CI/CD

Tekton pipelines build, test, and deploy automatically on merge. Integration tests run against every deployment.

Container Security

Minimal base images (Alpine Linux). Non-root container execution. Read-only root filesystems where possible.

Monitoring

Prometheus metrics, Grafana dashboards, and structured logging via Fluent Bit provide observability across all services.

Technology Stack

Kubernetes HashiCorp Vault ArgoCD Tekton Traefik Authentik Prometheus Grafana cert-manager Let's Encrypt

Privacy

We believe in data minimalism. We publish what's already public record and collect the minimum necessary from our visitors.

Data We Publish

Political finance data on elect.info comes from publicly available records and documented sources. We do not:

  • Collect or publish non-public personal information
  • Scrape social media or private databases
  • Infer political affiliations beyond official filings
  • Sell or share data with third parties for commercial purposes

Visitor Privacy

When you visit elect.info:

  • No third-party analytics or tracking scripts
  • No advertising networks or pixels
  • No user profiling or behavioral tracking
  • Minimal functional cookies only
  • Server access logs retained for operational purposes only

Right to Be Forgotten

Because we publish official public records, we generally cannot remove individual records from our dataset. If you believe data about you is inaccurate, contact us and we will verify against the original source filing. Corrections from official sources are automatically incorporated in our next pipeline run.

Compliance

We are proactively pursuing industry-recognized certifications and regulatory compliance to ensure the highest standards of data protection and organizational security.

SOC 2

In Progress

We are actively working toward SOC 2 Type II certification, which evaluates an organization's controls related to security, availability, processing integrity, confidentiality, and privacy.

Our existing infrastructure practices — including Vault-managed secrets, encrypted storage, GitOps deployments, and structured audit logging — provide a strong foundation for SOC 2 compliance.

Data Privacy Regulations

We are pursuing certification of compliance with major data privacy regulations:

In Progress

GDPR

General Data Protection Regulation (EU). We are aligning our data handling practices with GDPR requirements including data subject rights, lawful basis for processing, and data protection by design.

In Progress

CCPA / CPRA

California Consumer Privacy Act and California Privacy Rights Act. We are implementing controls to support consumer rights including the right to know, delete, and opt-out of the sale of personal information.

Planned

Additional Jurisdictions

As we expand our coverage to international election finance data, we will pursue compliance with applicable data privacy regulations in those jurisdictions.

Our Approach

  • Privacy by design embedded in our data pipeline architecture
  • Regular review of data handling practices against regulatory requirements
  • Documented data processing activities and lawful basis for processing
  • Data subject rights procedures for access, rectification, and erasure requests
  • Vendor and subprocessor due diligence for all third-party services
  • Ongoing employee and contractor training on data protection obligations

Contact

For compliance inquiries or to exercise your data rights, contact us at hello@elect.info.